Skip to main content

Authorization Basics (Operator Field Manual)

Every card transaction starts with authorization. Get it wrong and you lose the sale or eat the chargeback. Understand the request/response cycle, what the codes mean, and how to handle edge cases.

Last verified: Dec 2025. Response codes and rules evolve; confirm with your processor.

What Matters (5 bullets)

  • Authorization is permission, not payment. Auth reserves funds; settlement moves money.
  • Always authorize before capture. Processing without auth = automatic chargeback liability.
  • Response codes tell you why it failed. Soft vs hard declines need different handling.
  • Authorizations expire. Protection periods vary by transaction type; clear within window.
  • Match auth amount to capture amount. Tolerance limits exist, but exceeding them creates disputes.

How Authorization Works

The Authorization Flow

Time elapsed: 1-3 seconds typically

What's in an Auth Request

FieldPurpose
Card number (PAN)Identifies account
ExpirationValidates card currency
CVVProves card possession (CNP)
AmountFunds to reserve
CurrencyWhich currency
MCCMerchant category
AVS dataAddress verification
3DS dataAuthentication results

What's in an Auth Response

FieldMeaning
Response codeApprove, decline, or refer
Authorization codeApproval reference (if approved)
AVS resultAddress match result
CVV resultCVV match result
Network transaction IDFor tracking

Authorization vs Capture vs Settlement

StageWhat HappensWhen
AuthorizationIssuer reserves fundsAt checkout
CaptureMerchant claims the authAt fulfillment
SettlementMoney movesBatch processing (daily)

Pre-Authorization vs Final Authorization

TypeUse CaseProtection Period
Pre-authEstimate before final (hotels, car rental)30 days (Mastercard)
Final authExact amount known7 days typical
Incremental authAdding to existing (hospitality)Varies

Response Codes

Common Approval Codes

CodeMeaning
00Approved
10Partial approval (debit)
85No reason to decline (card verification)

Soft Declines (Retry May Work)

CodeMeaningAction
05Do not honorRetry later or different card
51Insufficient fundsRetry later
61Exceeds withdrawal limitRetry smaller amount
65Exceeds frequency limitRetry later
N7CVV mismatchAsk customer to re-enter

Hard Declines (Don't Retry)

CodeMeaningAction
04Pick up cardDo not process
07Pick up card (fraud)Do not process
14Invalid card numberCheck entry
41Lost cardDo not process
43Stolen cardDo not process
54Expired cardRequest valid card
57Transaction not permittedDifferent payment needed

Referrals

CodeMeaningAction
01Refer to issuerVoice authorization available
02Refer to issuer (special)Voice authorization available

Authorization Protection Periods

Authorizations expire. Clear transactions within the protection window or risk chargebacks.

Visa

Transaction TypeProtection Period
Standard7 days
Hotels/car rental31 days
Cruise lines31 days

Mastercard

Transaction TypeProtection Period
Final authorization7 days
Pre-authorization30 days
India domestic4 days

Best Practice

  • Capture as close to auth as possible
  • Set alerts before protection expires
  • Re-authorize if you'll exceed the window

Amount Tolerance

The capture amount can differ from auth amount within limits.

Visa Tolerances

Transaction TypeTolerance
Standard retail0%
US restaurants20% (for tips)
Hotels15%
Car rental15%

Mastercard Tolerances

Transaction TypeTolerance
Chip + PIN0%
Contactless0%
US card-present30%
US CNP (restaurants)30%
Other card-present20%

Currency Conversion

10% tolerance for FX rate differences between auth and clearing.


Common Authorization Issues

No Authorization Obtained

Problem: Transaction processed without auth Result: Automatic chargeback liability (11.3, 4808) Prevention: Always require online auth; no offline processing

Declined But Processed

Problem: Auth declined, transaction still processed Result: Automatic chargeback liability (11.2) Prevention: Never override declines; no "force" without real approval

Authorization Expired

Problem: Too long between auth and capture Result: Chargeback (12.1 late presentment) Prevention: Track auth dates; capture within window

Amount Exceeded Tolerance

Problem: Captured more than allowed variance Result: Chargeback for overage Prevention: Know tolerance by transaction type; re-auth if needed


Voice Authorization

When to use voice authorization:

  1. System timeout with customer present
  2. Referral response (01, 02)
  3. POS failure with customer waiting

Voice Auth Process

  1. Call acquirer's voice auth center
  2. Provide card details verbally
  3. Receive approval code
  4. Enter approval code in terminal
  5. Document the call

Voice Auth Risks

  • Fraudsters can obtain voice auths on stolen cards
  • No CVV/AVS protection
  • Higher scrutiny in disputes
  • Document everything

Authorization Best Practices

Always Do

  1. Get real-time authorization - Never process without auth
  2. Match amounts - Auth and capture should align
  3. Capture promptly - Don't let auths expire
  4. Handle declines gracefully - Good UX for soft declines
  5. Log everything - Auth code, timestamp, response

Never Do

  1. Force transactions - Don't override declines
  2. Process offline - Unless absolutely necessary with proper procedures
  3. Exceed tolerances - Re-auth if amount increases
  4. Ignore response codes - Each code means something
  5. Delay capture - Risk expiration and chargebacks

Scale Callout

VolumeFocus
Under $100k/moBasic auth handling; never override declines; capture same-day
$100k-$1M/moTrack auth expiration; implement retry logic for soft declines; monitor response code distribution
Over $1M/moIssuer-level auth analysis; optimize retry timing; network tokenization for recurring

Where This Breaks

  • Offline terminals - No real-time auth check; creates liability
  • Staff override culture - "Just run it through" = chargebacks
  • Long fulfillment - Auth expires before shipping
  • Manual processes - Voice auth without documentation
  • Amount changes - Final differs from estimate without re-auth

Next Steps

Understanding authorization?

  1. Learn the flow - Request to response
  2. Know auth vs capture vs settlement - Each stage
  3. Understand protection periods - 7-31 days by type

Handling declines?

  1. Check soft vs hard - Retry vs don't retry
  2. Use appropriate retry logic - When to try again
  3. Handle referrals - Voice auth when needed

Avoiding authorization issues?

  1. Follow best practices - Always do, never do
  2. Know common issues - Expired, exceeded, declined
  3. Capture within tolerance - Know the limits